How to Configure Remote Access?

1 Answer

Answer :

the computer world, you may come across a situation in which you need to get files from another computer but don’t have physical access to it, such as while on vacation. Luckily, there is a program that can prevent this problem from ever happening, called remote access. This lets you connect to the files and folders you designate from any computer you agree is allowed to connect. This will require some configuration, however.Go to the computer you want to be remotely accessible and log in as the administrator. Regular users are not given the permission to be able to open remote access, nor can they configure it. Of course, if you are the only user, you are already the administrator and this will not be an issue.Open the Start Menu and open the Control Panel. Navigate to the Performance and

Related questions

Description : Can some one help me configure my tablet?

Last Answer : Adjust the screen resolution, that will make everything smaller otherwise no. Its a touchschroon monitor for a reason. You could maye uninstall the monitor rivers only but I doubt it.

Description : Are there any programs that allow you to configure more keys as modifier keys?

Last Answer : Autohotkey is the gold standard.

Description : Did the Luftwaffe configure the Messerschmitt Bf 109 with an external fuel tank?

Last Answer : I don’t know, there are some references to a “drop tank” which may be internal in a bomb bay, or external. However, should be covered in this book: http://books.google.com/books?id=nnSbAAAACAAJ&dq=isbn:0760311943&cd=1 if you can find it

Description : How should I configure my MacBook's new 320GB internal hard drive?

Last Answer : One partition, HFS+, Journaled.

Description : Is there a way to configure an iPhone with setting schemes?

Last Answer : best way to configure it is to jailbreak it

Description : How can I configure Firefox so it automatically refreshes a page after I hit "Back"?

Last Answer : I’m not sure if either of those is possible at all. Unless you’re a l33t h4XX0r and you’re a bad enough dude to go rewrite the whole program.

Description : How do you configure programs like BitComet, BitTorrent, uTorrent, or Limewire, Ares to work on a very large network, such as a college campus?

Last Answer : Unfortunately, there isn't a lot you can do if you don't control the ports. You can try setting your port to 80 or 443 (used for normal web browsing), but chances are this won't help.

Description : Is there a way to configure Apple Mail, in Leopard to connect to an exchange server?

Last Answer : Not if you need ActiveSync to work. There is an exchange option, but it’s basically using IMAP.

Description : Hi i'm trying to configure a mincraftmod line say: Swords to exclude from blocking. Intended for modded swords that already have their own right-click function. Format for every entry is ":".S:"Blocking Exclusion List"?

Last Answer : Where or/and how do I introduce the item ID to make it work(Idon´t know what it actually mean with : so if you could help me with that question I would be very grateful).Also there are like 9 spaces between ":". and S:"Blocking Exclusion List" and like 10 between the last ""

Description : Do you have a hosting site that is easy to configure and more affordable?

Last Answer : HostGator makes unlimited Web Hosting easy and affordable with unlimited disk space and bandwidth and an easy control panel. Low prices and easy setup makes HostGator one of the leading web hosting firms in the industry!cutt.ly/xkEZNxq

Description : How do I configure PPTP server ?

Last Answer : PPTP Server The simplest configuration of VPN protocols is usually PPTP . It is easy to setup and can be used with many types of clients. In fact, most clients support this protocol. All clients from ... 2008 are PPTP enabled. Although simple to use, it is not very convenient in terms of security.

Description : Is the AP-G250 easy to configure as a router?

Last Answer : The AP-G250 has setup instructions as well as a computer interface making it easy to install.

Description : Which of the following buttons do you click to pre-configure the fields in an executable transaction screen?

Last Answer : Variant

Description : Management Software is used for? A. It helps to maintain and configure the infrastructure. B. It helps to deploy and integrate the application on the cloud. C. Both A and B D. None of the above

Last Answer : It helps to maintain and configure the infrastructure.

Description : To configure Jaxb2Marshaller marshaller we require. a) ClassesToBeBound b) ContextPath c) All of the mentioned d) None of the mentioned

Last Answer : All of the mentioned

Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.

Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud

Description : Which bit of TMOD will exactly configure timer / counter as a timer or counter. i) TMOD.6 of C/T for timer 1 ii) TMOD.6 of C/T for timer 0 iii) TMOD.2 of C/T for timer 0 iv) TMOD.2 of C/T for timer 1 a) i, ii b) ii, iv c) i, iii d) iii, iv

Last Answer : a) i, ii

Description : What is the best way to configure a bypass line in slurry services?

Last Answer : Bypass lines should be placed ABOVE the control valve so that the slurry cannot settle out and build up in the line during bypass.

Description : Write procedure to configure TCP/IP settings in a network.

Last Answer : Linux includes a network configuration tool that enables you to configure various network interfaces on your system for TCP/IP networking. You can run the network configuration tool to add a new network interface or ... , you may use IP addresses in the range 192.168.0.0 to 192.168.255.255

Description : Should a school district be able to monitor students via remote access to laptops?

Last Answer : No…Hell no.

Description : Dumb question about Dell tech support and remote access...

Last Answer : poofandmook, the techician can see everything on your computer right now. Everything. He's using a remote assistance login, which gives him full control. If you want to see what he's doing, ... though the tech has an unrestricted account, he cannot see anything that is encrypted for your account.

Description : Best networkable + remote access storage compatible with Mac?

Last Answer : a .mac account gives you 10GB of storage accessible anywhere in the world, but if you are going to be video-heavy, then you'll need some sort of NAS system; btw, Leopard allows remote ... This feature allows remote access to your home mac's directories from anywhere on the internet from any mac.

Description : is it possible to access my vista pc using remote desktop software on a windows mobile 6 pro pda phone?

Last Answer : I do this on my WM2003 PDA with www.logmein.com. It’s works great for. You should check it out.

Description : How to Get Internet Access in Remote Areas with Satellite Internet Providers?

Last Answer : As technological innovations sweep across the globe, there are still areas of country that remain without top quality coverage from cable and internet companies. Residential and business customers in ... high speed satellite internet service to residential and business customers in rural areas. S

Description : How do i block remote access?

Last Answer : There are many electronic devices that block remote access. You can check online or at local electronic stores to find something to block remote access.

Description : How do you get access to remote places in national parks?

Last Answer : Many remote places in public parks are inaccessable to the general public as these places are maintained to be a pristine location. Contacting the park ranger will give you an idea of which areas are compleatly closed to the public, and which ones you may access through special means.

Description : How do you set up remote access on a PC?

Last Answer : remote access on a PC is mainly used for 2 things * accessing files remotely * accessing and controlling the desktop remotely. The idea of remote desktop software is to enable you to operate your ... also be enabled to access the PC remotely. For Linux and Mac systems the Technology is called VNC

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : I purchased a dvr on ebay to expand with directv, the remote is not working on this unit but it works on the others in my house. Do you do repair work If you do when can I bring it in and do you have access cards for DirecTV?

Last Answer : Generaly speaking there is no repair needed some remotes just will not work with older or newer machines.

Description : What is free remote access and will it take over the world?

Last Answer : Remote access is good for business people who might need something off their computers at work while at home or traveling. It's also good if you have an issue with your computer and tech support ... for people to randomly take over peoples computer there should be some kind of code or lock out.

Description : How do I get remote access to my computer?

Last Answer : CNET.com has a wonderful list of both freeware and for-purchase options for accessing your computer remotely at http://download.cnet.com/windows/remote-access/. Their list is very PC-centric; if you have a Mac, a list of remote access options can be found at http://www.pure-mac.com/remote.html.

Description : How do I get remote access to another computer?

Last Answer : Setting up the Remote Desktop Connection program will allow you to gain remote access to another computer. This can be found under the "Accessories" item in your Start menu.

Description : What is the definition of remote access?

Last Answer : Remote access is having the ability to gain access to a computer or network from another location. So, if you setup your computer for remote access, you can go on vacation and still gain access to files in your computer. However, you will have to use another computer to gain access.

Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned

Last Answer : a) batch processing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.